Filters
Question type

Study Flashcards

The OSI security architecture focuses on security attacks,__________,and services.

Correct Answer

verifed

verified

A threat action in which sensitive data are directly released to an unauthorized entity is __________.


A) corruption
B) intrusion
C) disruption
D) exposure

Correct Answer

verifed

verified

The first step in devising security services and mechanisms is to develop a security policy.

Correct Answer

verifed

verified

The assets of a computer system can be categorized as hardware,software,communication lines and networks,and _________.

Correct Answer

verifed

verified

A __________ is any action that compromises the security of information owned by an organization.


A) security mechanism
B) security policy
C) security attack
D) security service

Correct Answer

verifed

verified

Data integrity assures that information and programs are changed only in a specified and authorized manner.

Correct Answer

verifed

verified

Many security administrators view strong security as an impediment to efficient and user-friendly operation of an information system.

Correct Answer

verifed

verified

A(n)_________ assessment is periodically assessing the risk to organizational operations,organizational assets,and individuals,resulting from the operation of organizational information systems and the associated processing,storage,or transmission or organizational information.

Correct Answer

verifed

verified

Masquerade,falsification,and repudiation are threat actions that cause __________ threat consequences.


A) unauthorized disclosure
B) disruption
C) deception
D) usurpation

Correct Answer

verifed

verified

Security implementation involves four complementary courses of action: prevention,detection,response,and _________.

Correct Answer

verifed

verified

A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources.


A) passive attack
B) outside attack
C) inside attack
D) active attack

Correct Answer

verifed

verified

The assurance that data received are exactly as sent by an authorized entity is __________.


A) authentication
B) access control
C) data confidentiality
D) data integrity

Correct Answer

verifed

verified

Confidentiality,Integrity,and Availability form what is often referred to as the _____.

Correct Answer

verifed

verified

In the United States,student grade information is an asset whose confidentiality is regulated by the __________.

Correct Answer

verifed

verified

FERPA (Fam...

View Answer

Release of message contents and traffic analysis are two types of _________ attacks.

Correct Answer

verifed

verified

A loss of _________ is the unauthorized disclosure of information.


A) confidentiality
B) authenticity
C) integrity
D) availability

Correct Answer

verifed

verified

Hardware is the most vulnerable to attack and the least susceptible to automated controls.

Correct Answer

verifed

verified

Threats are attacks carried out.

Correct Answer

verifed

verified

A loss of _________ is the disruption of access to or use of information or an information system.

Correct Answer

verifed

verified

Establishing,maintaining,and implementing plans for emergency response,backup operations,and post disaster recovery for organizational information systems to ensure the availability of critical information resources and continuity of operations in emergency situations is a __________ plan.

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer